and Security Technologies

Results: 1110



#Item
301Technology / Energy / Interoperability / Smart grid policy in the United States / IEEE Smart Grid / Emerging technologies / Electric power transmission systems / Smart grid

Smart Grid: NIST Role and Three Phase Plan Energy Independence and Security Act (EISA) of 2007, Title XIII, SectionSmart Grid Interoperability Framework: In cooperation with the DoE and other stakeholders, NIST ha

Add to Reading List

Source URL: www.wca.org

Language: English - Date: 2010-01-21 02:00:28
302Security / Internet / Application firewall / Computer network security / Computer security / Computing / Akamai Technologies / Content delivery network

AKAMAI SERVICE AND SUPPORT SOLUTIONS: PRODUCT BRIEF Rule Update Service Comprehensive website defense solution against sophisticated attack methods Kona Site Defender provides customers with a highly scalable and compr

Add to Reading List

Source URL: www.akamai.com

Language: English - Date: 2014-11-27 04:22:01
303Software / Computer networking / Computer network security / Network management / Internet privacy / Proxy server / Windows / Network traffic measurement / Windows Vista networking technologies / Computing / System software / Windows Server

Policy.Net Enterprise TM Policy.Net Enterprise offers a comprehensive traffic management solution, with distributed endpoint policy enforcement and centralized policy definition. Policy.Net provides endpoint network secu

Add to Reading List

Source URL: www.netveda.com

Language: English - Date: 2011-01-21 15:58:58
304Computing / Deep content inspection / Network security / Application firewall / Distributed firewall / Check Point / Computer network security / Computer security / Cyberwarfare

Endpoint Based Policy Management: The Road Ahead Introduction In a rapidly growing and crowded security solutions market, organizations need to deploy the most effective technologies taking into consideration the legiti

Add to Reading List

Source URL: www.netveda.com

Language: English - Date: 2011-01-21 15:58:56
305Rice / Productivity improving technologies / Farm / Food security / Agriculture / Human geography / Land management

Agricultural Engineering R&D in Indonesia: Challenge and Prospect Toward Sustainable Agriculture and APCAEM Programme1 Handaka2 I. INTRODUCTION Increase productivity through intensification, reduce post harvest losses, i

Add to Reading List

Source URL: www.unapcaem.org

Language: English - Date: 2013-11-13 01:54:10
306Genetic engineering / Emerging technologies / Biotechnology / Agronomy / Genetically modified food / Genetically modified organism / Soybean / Food security / Plant breeding / Biology / Molecular biology / Food and drink

Biotechnology: Is It Defendable? CARL B. LOOP, JR. Vice President American Farm Bureau Federation Gainesville, FL

Add to Reading List

Source URL: nabc.cals.cornell.edu

Language: English - Date: 2013-07-23 13:50:21
307Health informatics / Security token / Two-factor authentication / Electronic prescribing / Authentication / Biometrics / Electronic medical record / One-time password / Multi-factor authentication / Security / Health / Access control

DATA SHEET CA Technologies and BIO-key™ Solution for Secure Electronic Prescribing of Controlled Substances At a Glance

Add to Reading List

Source URL: www.bio-key.com

Language: English - Date: 2014-08-19 14:10:15
308Security / Identity management / Single sign-on / OpenID / Internet privacy / Privacy-enhancing technologies / Federated identity / Identity / Computer security

Poster: Users’ Perceptions of and Willingness to Use Single-Sign-On Functionality 1 Lujo Bauer, Cristian Bravo-Lillo, Elli Fragkaki, William Melicher, Michael Stroucken {lbauer, cbravo, elli, billy, mxs}@cmu.edu

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2014-07-06 08:47:40
309Medicine / Food safety / Center for Food Safety and Applied Nutrition / U.S. Customs and Border Protection / Federal Food /  Drug /  and Cosmetic Act / Office of Regulatory Affairs / FDA / Regulation of food and dietary supplements by the U.S. Food and Drug Administration / Applied Food Technologies / Food and Drug Administration / Health / Safety

Compliance Policy Guide Guidance for FDA and CBP Staff SecPrior Notice of Imported Food Under the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 Draft Guidance

Add to Reading List

Source URL: www.fda.gov

Language: English
310Block cipher / Hash function / Collision attack / One-way compression function / Index of cryptography articles / Cryptography / Cryptographic hash functions / Error detection and correction

Near-Collision Attack and Collision-Attack on Double Block Length Compression Functions based on the Block Cipher IDEA Donghoon Chang Center for Information Security Technologies(CIST), Korea University, Korea

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2006-12-24 08:27:19
UPDATE